From: adacrypt on
Advances in computer science will most certainly dictate the classes
of cryptography that may be forced on us in the future and whether we
like it or not we may not have any say in the matter of what
transpires as the way forward in the future of the cryptography
industry.

The case has been made by me in frequent posts for Mutual Database
Cryptography and it is useful to spell out the subclasses that will
exist in this broad general class. All cryptography will be studiously
devoid of function mathematics on the basis that if ciphertext is
created by transforming plaintext into ciphertext by mathematical
means it can be inverted also by other mathematics – the prognosis
therefore is that there can never be any expectation of theoretically
unbreakable cryptography from that source i.e. these are
mathematically driven highly transparent ciphers that are complexity-
theoretic and depend on keys embedded within the ciphertext or keys
requiring separate transport by secure means.

Future cryptography will all be on the basis of mapping plaintext
directly to scattered points in space. That will be done in a
sporadic but retrievable way that is only barely mathematical per se
by using rudimentary and very minimal methods. This totally disables
the scope of cryptanalysis.

In the case of mapping plaintext to points in three-dimensional space,
coordinate plane methods will be used on vector algebraic variables.

The XY plane is a subset of three-dimensional space where Z = 0, the
methods to be used then will be scalar.

This is a broad but definitive overview that has been thoroughly
expounded already in posts to sci crypt and on my websites http://www.adacrytp.com
(see “A New Approach to Cryptography”) and on http://www.scalarcryptography.co.uk
(this latter exposition is something less that simple because it
breaks new ground in modular arithmetic methodology – it needs to
teased out by well equipped mathematicians).

There is a big question mark regarding current cryptography that uses
the XY plane also. Although practically unbreakable cryptography is
de rigueur in main stream cryptography today at both national and
commercials levels the fact remains that theoretically unbreakable
cryptography will always be the first prize at national level and
changes can be expected as the threat from increasing computer power
becomes too close for comfort and the vector cryptography on offer by
me becomes more attractive to users as a result.

The current spate of less than perfect ciphers are still of great
interest to everybody. Pursuing such cryptography can only be a
cultural pursuit in mathematics however that is more an art form than
a realistic prospect to national security and long may it continue as
such but with the understanding that it is a very temporal thing that
has to be ready to accede to being superseded suddenly should say
quantum computers ever become common-place items. It is only as
commendable as chess or difficult scrabble or even prodigiously
difficult crossword puzzles. This is not meant to be demeaning of
peoples efforts but you got to get real about it – there is no
scientific future for this cryptography other than a hobby topic in
applied mathematics and it is a case of living in a fools’ paradise to
go on banging the drum for its continuance in global secure
communications - adacrypt
From: Globemaker on
> it breaks new ground in modular arithmetic methodology - it needs to
> teased out by well equipped mathematicians).

Even better, paid mathemticians would be used, so that they would be
motivated to finish your project. Your algorism can be published in
Popular Cryptography Magazine.

Sycophants and Dilettantes Needed for "Popular Cryptography Magazine"

Öïñ á÷éïìáôéc óïõñcåó ïö ëå÷écïãñáðçî, óåå çôôð://ùùù.åôîìïíëéíå.cïì

Announcing the start of "Popular Cryptography Magazine". Writers are
needed to produce the first Ada issue, to be published on June 22,
2010. The readers of sci.crypt and alt.ego.psych who are sycophants or
dilettantes are invited to submit encrypted essays that will be
published anonymously or pseudonyminally on a new website. This
magazine focuses on vestigial artifacts abandoned by a throwback who
attempts briefly to decrypt submissions and who then emerges from
obscurity. This will be a densely written manifold Adacrypt text which
conceals messages from a goal set long ago. Turgid phraseology and
languid smarminess deplete the manuscript of complacency generating
dogma. A glossary is given at the end. English words that are
excessively convoluted are devoluted critically, lending creative
erudition to an otherwise incomprehensible magazine. An effort is made
to preclude ubiquitous elocution, however, the effort fails,
dramatically at times, but usually with aplomb, I think.
From: rossum on
On Mon, 21 Jun 2010 07:41:32 -0700 (PDT), Globemaker
<alanfolmsbee(a)cabanova.com> wrote:

>Sycophants and Dilettantes Needed for "Popular Cryptography Magazine"
I think you might find that that particular marketing niche is already
filled by: http://www.anagram.com/~jcrap/

I particularly enjoyed Malgorzata Kupiecka's article about advanced
Roman cryptography: http://www.anagram.com/~jcrap/Volume_3/caesar.pdf

rossum

From: Gordon Burditt on
>Advances in computer science will most certainly dictate the classes
>of cryptography that may be forced on us in the future and whether we
>like it or not we may not have any say in the matter of what
>transpires as the way forward in the future of the cryptography
>industry.

One of these things which has pretty much already happened is that
plaintext is a computer file, and you'd better be prepared to
reproduce it exactly bit-for-bit in an encrypt/decrypt cycle. It
might be audio, video, a computer program, or text (with or without
word-processing attributes and embedded images), or lots of other
stuff. "printable ASCII only" with newlines inserted at stupid
positions is not acceptable.

>The case has been made by me in frequent posts for Mutual Database
>Cryptography and it is useful to spell out the subclasses that will

Mutual Database Cryptography gets out of sync if messages are
decrypted out of order, duplicated, or corrupted in transit. That's
"just a management issue" that adacrypt doesn't want to talk about.
Still, it's a serious problem for most applications, and it makes
it really easy for an enemy to foul up communications at just the
time when they are most needed.

>exist in this broad general class. All cryptography will be studiously
>devoid of function mathematics on the basis that if ciphertext is
>created by transforming plaintext into ciphertext by mathematical
>means it can be inverted also by other mathematics �

You do know that vectors use mathematics, don't you? Are you throwing
your last set of cryptography under the bus, again?

>the prognosis
>therefore is that there can never be any expectation of theoretically
>unbreakable cryptography from that source i.e. these are
>mathematically driven highly transparent ciphers that are complexity-
>theoretic and depend on keys embedded within the ciphertext or keys
>requiring separate transport by secure means.

I expect no theoretically unbreakable cryptography from adacrypt until
he admits that it requires a key at least the size of the sum of the
sizes of all messages to be sent.

>Future cryptography will all be on the basis of mapping plaintext
>directly to scattered points in space. That will be done in a
>sporadic

The only meaning for "sporadic" here that seems to make sense is
"except when I'm drunk or stoned", which ties in to hallucinogen-based
cryptography. No, I'm not going to give you a link to a dealer,
because I don't have one.

>but retrievable way that is only barely mathematical per se
>by using rudimentary and very minimal methods. This totally disables
>the scope of cryptanalysis.

This requires a jinormous pre-shared key the size of the plaintext
you intend sending over the lifetime of the channel. This presents
equally jinormous management problems, which adacrypt doesn't like
to discuss here because he doesn't have any answers for the problems
involved.

>In the case of mapping plaintext to points in three-dimensional space,
>coordinate plane methods will be used on vector algebraic variables.
>
>The XY plane is a subset of three-dimensional space where Z = 0, the
>methods to be used then will be scalar.

Scalar is two-dimensional? Since when?

>This is a broad but definitive overview that has been thoroughly
>expounded already in posts to sci crypt and on my websites
>http://www.adacrytp.com
>(see �A New Approach to Cryptography�) and on
>http://www.scalarcryptography.co.uk
>(this latter exposition is something less that simple because it
>breaks new ground in modular arithmetic methodology � it needs to
>teased out by well equipped mathematicians).

>There is a big question mark regarding current cryptography that uses
>the XY plane also. Although practically unbreakable cryptography is
>de rigueur in main stream cryptography today at both national and
>commercials levels the fact remains that theoretically unbreakable
>cryptography will always be the first prize at national level and

Theoretically unbreakable cryptography is unsuitable for many
cryptographic applications, due to requirements for a secure
channel, a large pre-shared key, and it cannot do public-key
cryptography.

>changes can be expected as the threat from increasing computer power
>becomes too close for comfort and the vector cryptography on offer by
>me becomes more attractive to users as a result.

Was that the vectors that don't require math?

>The current spate of less than perfect ciphers are still of great
>interest to everybody. Pursuing such cryptography can only be a
>cultural pursuit in mathematics however that is more an art form than
>a realistic prospect to national security and long may it continue as
>such but with the understanding that it is a very temporal thing that
>has to be ready to accede to being superseded suddenly should say
>quantum computers ever become common-place items. It is only as
>commendable as chess or difficult scrabble or even prodigiously
>difficult crossword puzzles. This is not meant to be demeaning of
>peoples efforts but you got to get real about it � there is no

Get real about it: theoretically unbreakable cryptography is
unsuitable for most applications because of the need for a very
large pre-shared key.

>scientific future for this cryptography other than a hobby topic in
>applied mathematics and it is a case of living in a fools� paradise to
>go on banging the drum for its continuance in global secure
>communications - adacrypt


From: Bruce Stephens on
gordonb.k8wza(a)burditt.org (Gordon Burditt) writes:

[...]

> Mutual Database Cryptography gets out of sync if messages are
> decrypted out of order, duplicated, or corrupted in transit. That's
> "just a management issue" that adacrypt doesn't want to talk about.

Just as bad the databases must be kept secret or the perfect security
property no longer holds.

[...]

> You do know that vectors use mathematics, don't you? Are you throwing
> your last set of cryptography under the bus, again?

He's previously argued that *his* vectors are real physical Vectors not
the ordinary numerical analysis vectors. I've no idea what he thinks
that means, but perhaps that's why he uses only 3-dimensional vectors?

[...]